Review of Signature-based Techniques in Antivirus Products

被引:23
作者
Al-Asli, Mohammed [1 ]
Ghaleb, Taher Ahmed [2 ]
机构
[1] Taibah Univ, Dept Comp Engn, Medina, Saudi Arabia
[2] Queens Univ, Sch Comp, Kingston, ON, Canada
来源
2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS) | 2019年
关键词
Antivirus products; Malware detection; Signature-based technique; Proprietary software; Anti-cyber crime; DYNAMIC MALWARE ANALYSIS; ALGORITHM; MACHINE; ENGINE;
D O I
10.1109/iccisci.2019.8716381
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing antivirus products employ diverse types of techniques to detect malware or any suspicious activities. The majority of such techniques rely on signature-based detection algorithms. However, the speed of such detection algorithms may adversely impact the performance of the antivirus products (e.g., if used for online virus scanning). In this paper, we review existing research that proposed fast and efficient signature-based algorithms to dynamically improve the time and accuracy of virus detection. We classify and discuss the different algorithms according to the type of analysis they perform (i.e., static, dynamic or hybrid). In addition, we evaluate existing virus detection algorithms using different design issues and performance criteria, namely (a) memory cost, (b) time complexity, and (c) detection rates. In addition, we discuss how certain design choices of signature-based approaches can only apply to specific virus detection circumstances. Finally, we present the current research challenges of using signature-based algorithms for investigating cybercrime activities.
引用
收藏
页码:422 / 427
页数:6
相关论文
共 58 条
[1]   EFFICIENT STRING MATCHING - AID TO BIBLIOGRAPHIC SEARCH [J].
AHO, AV ;
CORASICK, MJ .
COMMUNICATIONS OF THE ACM, 1975, 18 (06) :333-340
[2]  
Alsaadi HH, 2018, INT CONF NEW TECHNOL
[3]   An Efficient Pattern Matching Algorithm for Intrusion Detection Systems [J].
Anithakumari, S. ;
Chithraprasad, D. .
2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, :223-+
[4]  
[Anonymous], 2016, Emerging Research in Computing, Information, Communication and Applications
[5]  
[Anonymous], CLUSTER COMPUTING
[6]  
[Anonymous], 2014, P 2014 INT C ADV ELE
[7]  
Bott R., 2018, uS Patent App, Patent No. [15/ 714,493, 15714493]
[8]   FAST STRING SEARCHING ALGORITHM [J].
BOYER, RS ;
MOORE, JS .
COMMUNICATIONS OF THE ACM, 1977, 20 (10) :762-772
[9]   Simple and effective method for detecting abnormal internet behaviors of mobile devices [J].
Chen, Patrick Shicheng ;
Lin, Shu-Chiung ;
Sun, Chien-Hsing .
INFORMATION SCIENCES, 2015, 321 :193-204
[10]  
Choi Y.-H., 2008, P 27 IEEE C COMP COM, P2288, DOI DOI 10.1109/INFOCOM.2008.297